427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet80/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   76   77   78   79   80   81   82   83   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Alternative Botnet C&Cs • Chapter 3
87
427_Botnet_03.qxd 1/8/07 11:56 AM Page 87


The stolen credentials are then uploaded to an FTP server maintained by
the botnet controller. Botherders maintain elaborate statistics about the cre-
dentials stolen and where they come from. Figures 3.2 and 3.3 show statistics
about the origins of credentials gathered by a botnet.
The botnet controller can then steal the user’s credentials and steal their
financial information and money, as well as potentially perform an identity
theft. In essence, these C&Cs, which are called drop zones, will record all cre-
dentials, no matter for what Web site, and feed them directly to the criminals
on the other end.
Some more advanced drop zones also provide with instructions, such as,
“If the user surfs to www.mybank.com, use this signature to steal only the
information we need!” Or even more advanced, “automatically send the
selected information in, so that we can direct you to change the user’s trans-
action on the fly, in real time, and send it instead to our account.”
Figure 3.2
Origins of Credentials Gathered by a Botnet
www.syngress.com
88
Chapter 3 • Alternative Botnet C&Cs
427_Botnet_03.qxd 1/8/07 11:56 AM Page 88


Figure 3.3
Bot Statistics 
Although these banking and phishing bots’ drop zones do not answer the
pure definition of what a C&C does, they are indeed a control channel, and
one that is a lot more live and active than most C&Cs of other types.
FTP is not the only protocol used for drop zones, but it is a leading one.
Some more information about economic uses for botnets can be found in
the following article:
www.beyondsecurity.com/whitepapers/SolomonEvronSept06.pdf.
Advanced DNS-Based Botnets
As we already discussed, DNS is used as a layer of obfuscation and security for
botnet C&Cs, providing redundancy and robustness, rather than serving as the
control channel itself. So far we discussed the trivial concepts of using the
DNS to represent IP addresses (as it was meant to), and multihoming,

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   76   77   78   79   80   81   82   83   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish